This rule states that Lambda functions must be in a Virtual Private Cloud (VPC) for security reasons.
Rule | Lambda functions should be in a VPC |
Framework | FedRAMP Moderate Revision 4 |
Severity | ✔ Low |
Rule Description:
Lambda functions should be configured to run within a Virtual Private Cloud (VPC) to meet the security requirements of FedRAMP Moderate Revision 4.
Reasoning:
By running Lambda functions within a VPC, network traffic is isolated and controlled, providing an additional layer of security. This helps to protect sensitive information and prevents unauthorized access to the Lambda functions and associated resources.
Troubleshooting Steps:
If you encounter any issues while configuring Lambda functions within a VPC, follow these troubleshooting steps:
Necessary Codes:
To configure a Lambda function to run within a VPC, you need to modify its settings using the AWS Command Line Interface (CLI) or AWS Management Console. Here is an example of the code required to configure a Lambda function within a VPC using the CLI:
aws lambda update-function-configuration --function-name <function-name> --vpc-config SubnetIds=<subnet-ids>,SecurityGroupIds=<security-group-ids>
Replace
<function-name>
with the name or ARN of the Lambda function you want to configure.
Replace <subnet-ids>
with a comma-separated list of the subnet IDs within the VPC that you want the Lambda function to access.
Replace <security-group-ids>
with a comma-separated list of the security group IDs that should be associated with the Lambda function.Step-by-Step Guide for Remediation:
Follow these steps to configure a Lambda function to run within a VPC:
Determine the VPC details:
Choose a method:
Configure Lambda function using the AWS Management Console:
Test the configuration:
By following these steps, you can successfully configure a Lambda function to run within a VPC, meeting the FedRAMP Moderate Revision 4 requirements.